Threshold schnorr with stateless deterministic signing from standard assumptions

F Garillot, Y Kondi, P Mohassel… - Advances in Cryptology …, 2021 - Springer
Schnorr's signature scheme permits an elegant threshold signing protocol due to its linear
signing equation. However each new signature consumes fresh randomness, which can be …

CycleFold: Folding-scheme-based recursive arguments over a cycle of elliptic curves

A Kothapalli, S Setty - Cryptology ePrint Archive, 2023 - eprint.iacr.org
This paper introduces CycleFold, a new and conceptually simple approach to instantiate
folding-scheme-based recursive arguments over a cycle of elliptic curves, for the purpose of …

Revisiting the nova proof system on a cycle of curves

W Nguyen, D Boneh, S Setty - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Nova is an efficient recursive proof system built from an elegant folding scheme for (relaxed)
R1CS statements. The original Nova paper (CRYPTO'22) presented Nova using a single …

Improving line-point zero knowledge: two multiplications for the price of one

S Dittmer, Y Ishai, S Lu, R Ostrovsky - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Recent advances in fast protocols for vector oblivious linear evaluation (VOLE) have
inspired a family of new VOLE-based lightweight designated-verifier NIZK protocols (Weng …

Pianist: Scalable zkrollups via fully distributed zero-knowledge proofs

T Liu, T Xie, J Zhang, D Song, Y Zhang - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In the past decade, blockchains have seen various financial and technological innovations,
with cryptocurrencies reaching a market cap of over 1 trillion dollars. However, scalability is …

Replicated state machines without replicated execution

J Lee, K Nikitin, S Setty - 2020 IEEE Symposium on Security …, 2020 - ieeexplore.ieee.org
This paper introduces a new approach to reduce end-to-end costs in large-scale replicated
systems built under a Byzantine fault model. Specifically, our approach transforms a given …

A tutorial on the interoperability of self-sovereign identities

H Yildiz, A Küpper, D Thatmann, S Göndör… - arXiv preprint arXiv …, 2022 - arxiv.org
Self-sovereign identity is the latest digital identity paradigm that allows users, organizations,
and things to manage identity in a decentralized fashion without any central authority …

Verifiable encodings for secure homomorphic analytics

S Chatel, C Knabenhans, A Pyrgelis… - arXiv preprint arXiv …, 2022 - arxiv.org
Homomorphic encryption, which enables the execution of arithmetic operations directly on
ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations …

Dew: transparent constant-sized zkSNARKs

A Arun, C Ganesh, S Lokam, T Mopuri… - Cryptology ePrint …, 2022 - eprint.iacr.org
We construct polynomial commitment schemes with constant sized evaluation proofs and
logarithmic verification time in the transparent setting. To the best of our knowledge, this is …

: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup

M Campanelli, N Gailly, R Gennaro… - … on Cryptology and …, 2023 - Springer
We present Testudo, a new FFT-less SNARK with a near linear-time prover, constant-time
verifier, constant-size proofs and a square-root-size universal setup. Testudo is based on a …